Isaca CISM Question Answer
Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?
Isaca CISM Summary
- Vendor: Isaca
- Product: CISM
- Update on: Jul 25, 2025
- Questions: 967